BeagleBeagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
Stars: ✭ 976 (+279.77%)
catalystCatalyst is an open source SOAR system that helps to automate alert handling and incident response processes
Stars: ✭ 91 (-64.59%)
MemProcFS-AnalyzerMemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR
Stars: ✭ 89 (-65.37%)
Thehive4pyPython API Client for TheHive
Stars: ✭ 143 (-44.36%)
CortexCortex: a Powerful Observable Analysis and Active Response Engine
Stars: ✭ 676 (+163.04%)
DfirtrackDFIRTrack - The Incident Response Tracking Application
Stars: ✭ 232 (-9.73%)
ThehivedocsDocumentation of TheHive
Stars: ✭ 353 (+37.35%)
ThehiveTheHive: a Scalable, Open Source and Free Security Incident Response Platform
Stars: ✭ 2,300 (+794.94%)
INDXRipperCarve file metadata from NTFS index ($I30) attributes
Stars: ✭ 32 (-87.55%)
Ir RescueA Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (+21.01%)
PackratLive system forensic collector
Stars: ✭ 16 (-93.77%)
MemlabsEducational, CTF-styled labs for individuals interested in Memory Forensics
Stars: ✭ 696 (+170.82%)
Cyberchef RecipesA list of cyber-chef recipes and curated links
Stars: ✭ 619 (+140.86%)
Cortex4pyPython API Client for Cortex
Stars: ✭ 22 (-91.44%)
ScriptingPS / Bash / Python / Other scripts For FUN!
Stars: ✭ 47 (-81.71%)
ThreathuntThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.
Stars: ✭ 92 (-64.2%)
fastfinderIncident Response - Fast suspicious file finder
Stars: ✭ 116 (-54.86%)
Artifacts📇 Digital Forensics Artifact Repository (forensicanalysis edition)
Stars: ✭ 21 (-91.83%)
MthcAll-in-one bundle of MISP, TheHive and Cortex
Stars: ✭ 134 (-47.86%)
ThreatpinchlookupDocumentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension
Stars: ✭ 257 (+0%)
rhqRecon Hunt Queries
Stars: ✭ 66 (-74.32%)
CASECyber-investigation Analysis Standard Expression (CASE) Ontology
Stars: ✭ 46 (-82.1%)
pyarascannerA simple many-rules to many-files YARA scanner for incident response or malware zoos.
Stars: ✭ 23 (-91.05%)
RdpCacheStitcherRdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (-31.52%)
Dfir OrcForensics artefact collection tool for systems running Microsoft Windows
Stars: ✭ 202 (-21.4%)
EvilizeParses Windows event logs files based on SANS Poster
Stars: ✭ 24 (-90.66%)
artifactcollector🚨 The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux system
Stars: ✭ 140 (-45.53%)
LinuxforensicsEverything related to Linux Forensics
Stars: ✭ 189 (-26.46%)
Atc ReactA knowledge base of actionable Incident Response techniques
Stars: ✭ 226 (-12.06%)
Docker-TemplatesDocker configurations for TheHive, Cortex and 3rd party tools
Stars: ✭ 71 (-72.37%)
HistoricprocesstreeAn Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree view.
Stars: ✭ 46 (-82.1%)
Awesome ForensicsA curated list of awesome forensic analysis tools and resources
Stars: ✭ 1,775 (+590.66%)
Forensic ToolsCIRCL system forensic tools or a jumble of tools to support forensic
Stars: ✭ 27 (-89.49%)
OrianaOriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The results are presented in a Web layer to help defenders identify outliers and suspicious behavior on corporate environments.
Stars: ✭ 152 (-40.86%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+163.04%)
Vast🔮 Visibility Across Space and Time
Stars: ✭ 227 (-11.67%)
MEATThis toolkit aims to help forensicators perform different kinds of acquisitions on iOS devices
Stars: ✭ 101 (-60.7%)
uacUAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.
Stars: ✭ 260 (+1.17%)
PockintA portable OSINT Swiss Army Knife for DFIR/OSINT professionals 🕵️ 🕵️ 🕵️
Stars: ✭ 196 (-23.74%)
ir scriptsincident response scripts
Stars: ✭ 17 (-93.39%)
PypowershellxrayPython script to decode common encoded PowerShell scripts
Stars: ✭ 192 (-25.29%)
PSTraceTrace ScriptBlock execution for powershell v2
Stars: ✭ 38 (-85.21%)
Imago ForensicsImago is a python tool that extract digital evidences from images.
Stars: ✭ 175 (-31.91%)
CCXDiggerThe CyberCX Digger project is designed to help Australian organisations determine if they have been impacted by certain high profile cyber security incidents. Digger provides threat hunting functionality packaged in a simple-to-use tool, allowing users to detect certain attacker activities; all for free.
Stars: ✭ 45 (-82.49%)
MindMaps#ThreatHunting #DFIR #Malware #Detection Mind Maps
Stars: ✭ 224 (-12.84%)
CDIRCDIR (Cyber Defense Institute Incident Response) Collector - live collection tool based on oss tool/library
Stars: ✭ 122 (-52.53%)
LevelDBDumperDumps all of the Key/Value pairs from a LevelDB database
Stars: ✭ 23 (-91.05%)
factual-rules-generatorFactual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.
Stars: ✭ 62 (-75.88%)
ForensicsToolsA list of free and open forensics analysis tools and other resources
Stars: ✭ 392 (+52.53%)
Get-NetworkConnectionEdited version of Lee Christensen's Get-NetworkConnection which includes timestamp for each network connection
Stars: ✭ 34 (-86.77%)
SyntheticSunSyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, managed AWS security services and, serverless technologies to continuously prevent, detect and respond to threats.
Stars: ✭ 49 (-80.93%)
WindowsDFIRRepository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or events.
Stars: ✭ 51 (-80.16%)
yara-validatorValidates yara rules and tries to repair the broken ones.
Stars: ✭ 37 (-85.6%)
complianceLegal, procedural and policies document templates for operating an IRT
Stars: ✭ 57 (-77.82%)
decwindbxA sort of a toolkit to decrypt Dropbox Windows DBX files
Stars: ✭ 22 (-91.44%)